{"title":"Signing the document content is not enough: A new attack to digital signature","authors":"F. Buccafurri, G. Caminiti, G. Lax","doi":"10.1109/ICADIWT.2008.4664402","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664402","url":null,"abstract":"Digital signature represents the only valid method to give signed electronic documents probative value at least as traditional documents with handwritten signature. The above claim has a full counterpart with the current law system of most countries, so that the process of document dematerialization has been already started relying on the current infrastructures as well as the current juridical regulations, with strong attention towards common interoperability rules. As a consequence, the issue regarding the vulnerabilities of digital signature is particularly important. This paper presents a new attack to digital signature not based on the insertion of instructions in the document to sign but in the same way producing a non-static visualization of the signed document, with the purpose of producing (legal) effects different from those desired by the signer. The paper proves the attack by example and gives a possible way to contrast it.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121077285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Book embedding of the k-ary hypercube","authors":"S. Bettayeb, D. Hoelzeman","doi":"10.1109/ICADIWT.2008.4664384","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664384","url":null,"abstract":"Graph embeddings play an important role in interconnection network and VLSI design. Determining the number of layers required to build a VLSI chip is just one of the many areas in which graph embeddings are used. A type of embedding that is helpful in determining the number of layers is a book embedding. We develop upper and lower bounds on the pagenumber of a book embedding of the k-ary hypercube along with an upper bound on the cumulative pagewidth.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121056116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Keyhanipour, M. Piroozmand, A. Bidoki, K. Badie
{"title":"User-based meta-search with the co-citation graph","authors":"A. Keyhanipour, M. Piroozmand, A. Bidoki, K. Badie","doi":"10.1109/ICADIWT.2008.4664410","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664410","url":null,"abstract":"Although there are numerous search engines in the Web environment, no one could claim producing reliable results in all conditions. This problem is becoming more serious considering the exponential growth of the number of Web resources. In the response to these challenges, the meta-search engines are introduced to enhance the search process by devoting some outstanding search engines as their information resources. In recent years, some approaches are proposed to handle the result combination problem which is the fundamental problem in the meta-search environment. In this paper, a new merging/re-ranking method is introduced which uses the characteristics of the Web co-citation graph that is constructed from search engines and returned lists. The information extracted from the co-citation graph, is combined and enriched by the userspsila click-through data as their implicit feedback in an adaptive framework. Experimental results show a noticeable improvement against the basic method as well as some well-known meta-search engines.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122864043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sung-Hyun Shin, Jinho Kim, Yang-Sae Moon, Sang-Wook Kim
{"title":"Incremental maintenance of horizontal view using PIVOT operation and differential files in relational DBMSs","authors":"Sung-Hyun Shin, Jinho Kim, Yang-Sae Moon, Sang-Wook Kim","doi":"10.1109/ICADIWT.2008.4664356","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664356","url":null,"abstract":"To analyze multidimensional data conveniently and efficiently, OLAP(online analytical processing) systems are widely using views with horizontal form to represent measurement values over multiple dimensions, while conventional RDBMSs usually manage tables with vertical form. In this paper, we propose an incremental maintenance of these horizontal views which updates efficiently them according to the changes of base source tables. We first propose an overall framework processing queries over horizontal views transformed from source tables with vertical form. In order to execute this view maintenance process efficiently, we keep every changes of source tables into differential files then we modify the horizontal views with the differential files. Because differential files have vertical forms, their tuples are converted to horizontal forms which are identical to horizontal views then they are applied to the maintenance of these views. Experimental results show that the proposed method is more effective than existing methods.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132713140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dedicated hardware architecture for cycle crossover operation","authors":"M. Yoshikawa, Kentaro Otsuka, H. Terai","doi":"10.1109/ICADIWT.2008.4664368","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664368","url":null,"abstract":"This paper discusses new dedicated hardware architecture for crossover operation in order to achieve high speed processing. The proposed architecture is based on cycle crossover algorithm which has superior search performance. It achieves not only high speed processing, but also reduction of the number of processing steps to obtain a solution. In order to evaluate the proposed architecture, we design the proposed architecture by using Verilog-HDL, and conduct logic simulation and logic synthesis. Simulation results prove the effectiveness of the proposed architecture in comparison with conventional software processing.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131921838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Maraqa, Farid Al-Zboun, Mufleh Dhyabat, R. A. Zitar
{"title":"Recognition of Arabic Sign Language (ArSL) using recurrent neural networks","authors":"M. Maraqa, Farid Al-Zboun, Mufleh Dhyabat, R. A. Zitar","doi":"10.1109/ICADIWT.2008.4664396","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664396","url":null,"abstract":"The objective of this paper is to introduce the use of two different recurrent neural networks in human hand gesture recognition for static images. Because neural networks are a promising tool for many human computer interaction applications, this paper focuses on the ability of neural networks to assist in Arabic Sign Language(ArSL) hand gesture recognition. We have introduced the steps of our proposed system and have presented the Elmanpsilas model as a partially recurrent architecture and a fully connected network with recurrent links that is believed to help the network to converge and gain stability, then we have tested it in an experiment held for this; the results of the experiment have showed that the suggested system with the fully recurrent architecture has had a performance with an accuracy rate 95%.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124132495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"APA Labs: An experimental web-based platform for the retrieval and analysis of news articles","authors":"W. Kienreich, E. Lex, C. Seifert","doi":"10.1109/ICADIWT.2008.4664318","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664318","url":null,"abstract":"In this paper, we present APA Labs, an experimental, Web-based platform supporting retrieval and analysis in the news archives of the Austrian Press Agency. APA Labs has been designed as a combination of a rich internet application with a modular system of interactive visualizations backed by server-side entity extraction and three-dimensional rendering capability. This paper outlines concepts and implementation details of APA Labs and presents several visualization modules based on research results from the field of Information and Knowledge visualization.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129921997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Disclosure prevention in XML","authors":"N. N. Mohy, M. El-Sharkawi","doi":"10.1109/ICADIWT.2008.4664412","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664412","url":null,"abstract":"Information security is considered the most serious requirement which must be carefully considered. Traditional security mechanism protects data at physical level such as encryption and access control, but todaypsilas organizations need to protect data on both levels physical and logical level. Since the organizationpsilas data may be published and shared by many users. Disclosure is a result of weakness of these security mechanisms. In this paper we discuss the problem of protecting XML data at logical level specifically solve the disclosure problem. The objective is to prevent an unauthorized user to infer sensitive information through the data they authorized to access (result of previous queries), integrity constraints, and using inferences. In most existing access control approaches the XML elements specified by access policies are either accessible or inaccessible according to their sensitivity. However, in some cases, the original XML elements are sensitive and inaccessible, but after being processed in some appropriate ways, the results become insensitive and thus accessible [6]. We propose a security mechanism called Disclosure Prevention Algorithm (DPA) that enhances both the security (by preventing disclosure) and availability (by considering suspected users only) of data represented in XML format.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"60 24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122360298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Watermarking relational database systems","authors":"A. Odeh, A. Al-Haj","doi":"10.1109/ICADIWT.2008.4664357","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664357","url":null,"abstract":"Watermarking relational databases is an emerging research area that deals with the legal issue of copyright protection of relational databases. In this paper, we propose an efficient database watermarking algorithm based on inserting a binary image watermark in the dasiatimepsila attribute of database tuples. Experimental results demonstrate the robustness of the proposed algorithm against common database attacks.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127496233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Wireless Sensor Network efficiency and adaptability through an SOS server agent","authors":"N. Jabeur, J. D. McCarthy, P. Graniero","doi":"10.1109/ICADIWT.2008.4664383","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664383","url":null,"abstract":"Advances in hardware management, network protocols, operating systems, and applications are promoting large-scale deployment of Wireless Sensor Networks (WSNs). However, the challenge still remains to optimize the use of available computing, communication, and power resources while fulfilling data collection tasks. We think that exploiting a broader range of the networkpsilas intrinsic properties can be helpful in providing users with the right data, at the right time, using the right sensors deployed in the right spatial areas. To this end, in this paper we propose a Sensor Observation Service server agent that uses semantic, logical, and physical connections between sensors in order to create a Data Gathering Network (DGN) on-the-fly that can better adapt to network changes and provide adjustable services to clients of the network.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114933077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}